lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <686262d3.a70a0220.d08a1.0002.GAE@google.com>
Date: Mon, 30 Jun 2025 03:11:31 -0700
From: syzbot <syzbot+cc7567f096079cb4146f@...kaller.appspotmail.com>
To: kent.overstreet@...ux.dev, linux-bcachefs@...r.kernel.org, 
	linux-kernel@...r.kernel.org, syzkaller-bugs@...glegroups.com
Subject: [syzbot] [bcachefs?] kernel panic: in transaction restart:
 transaction_restart_mem_realloced, last restarted by

Hello,

syzbot found the following issue on:

HEAD commit:    f02769e7f272 Merge tag 'devicetree-fixes-for-6.16-1' of gi..
git tree:       upstream
console output: https://syzkaller.appspot.com/x/log.txt?x=133b83d4580000
kernel config:  https://syzkaller.appspot.com/x/.config?x=79da270cec5ffd65
dashboard link: https://syzkaller.appspot.com/bug?extid=cc7567f096079cb4146f
compiler:       Debian clang version 20.1.6 (++20250514063057+1e4d39e07757-1~exp1~20250514183223.118), Debian LLD 20.1.6

Unfortunately, I don't have any reproducer for this issue yet.

Downloadable assets:
disk image (non-bootable): https://storage.googleapis.com/syzbot-assets/d900f083ada3/non_bootable_disk-f02769e7.raw.xz
vmlinux: https://storage.googleapis.com/syzbot-assets/a454895505b7/vmlinux-f02769e7.xz
kernel image: https://storage.googleapis.com/syzbot-assets/b5db986999e9/bzImage-f02769e7.xz

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+cc7567f096079cb4146f@...kaller.appspotmail.com

bcachefs (loop0): root directory missing, fixing
 done
bcachefs (loop0): check_unreachable_inodes...
bcachefs (loop0): unreachable inode:
  inum: 4100:4294967295 
    mode=40755
    flags=(4300000)
    journal_seq=23
    hash_seed=f497c5e8402f7aa5
    hash_type=siphash
    bi_size=0
    bi_sectors=0
    bi_version=0
    bi_atime=36304197331961109
    bi_ctime=36304197331961109
    bi_mtime=36304197331961109
    bi_otime=36304197331961109
    bi_uid=0
    bi_gid=0
    bi_nlink=0
    bi_generation=0
    bi_dev=0
    bi_data_checksum=0
    bi_compression=0
    bi_project=0
    bi_background_compression=0
    bi_data_replicas=0
    bi_promote_target=0
    bi_foreground_target=0
    bi_background_target=0
    bi_erasure_code=0
    bi_fields_set=0
    bi_dir=0
    bi_dir_offset=0
    bi_subvol=0
    bi_parent_subvol=0
    bi_nocow=0
    bi_depth=0
    bi_inodes_32bit=0
    bi_casefold=0, fixing
bcachefs (loop0): creating (disconnected)/lost+found in subvol 1 snapshot 4294967295
bcachefs (loop0): creating (disconnected)/lost+found in subvol 1 snapshot 4294967295
bcachefs (loop0): creating (disconnected)/lost+found in subvol 1 snapshot 4294967295
bcachefs (loop0): creating (disconnected)/lost+found in subvol 1 snapshot 4294967295
bcachefs (loop0): creating (disconnected)/lost+found in subvol 1 snapshot 4294967295
 done
bcachefs (loop0): check_subvolume_structure... done
bcachefs (loop0): check_directory_structure...
bcachefs (loop0): directory structure loop:
  4100:4294967295 4096:4294967295 4096:4294967295, fixing
Kernel panic - not syncing: in transaction restart: transaction_restart_mem_realloced, last restarted by
[<0>] btree_trans_restart_ip fs/bcachefs/btree_iter.h:364 [inline]
[<0>] __bch2_trans_kmalloc+0x5d7/0xc80 fs/bcachefs/btree_iter.c:3216
[<0>] bch2_trans_kmalloc_ip fs/bcachefs/btree_iter.h:604 [inline]
[<0>] bch2_trans_kmalloc fs/bcachefs/btree_iter.h:616 [inline]
[<0>] bch2_hash_delete_at fs/bcachefs/str_hash.h:364 [inline]
[<0>] bch2_fsck_remove_dirent+0x1032/0x12a0 fs/bcachefs/dirent.c:756
[<0>] remove_backpointer+0x1fe/0x280 fs/bcachefs/fsck.c:502
[<0>] check_path_loop fs/bcachefs/fsck.c:2700 [inline]
[<0>] bch2_check_directory_structure+0x1a7f/0x1f00 fs/bcachefs/fsck.c:2733
[<0>] bch2_run_recovery_pass fs/bcachefs/recovery_passes.c:485 [inline]
[<0>] __bch2_run_recovery_passes+0x392/0x1010 fs/bcachefs/recovery_passes.c:540
[<0>] bch2_run_recovery_passes+0x184/0x210 fs/bcachefs/recovery_passes.c:611
[<0>] bch2_fs_recovery+0x25fd/0x3950 fs/bcachefs/recovery.c:989
[<0>] bch2_fs_start+0xa99/0xd90 fs/bcachefs/super.c:1203
[<0>] bch2_fs_get_tree+0xb02/0x14f0 fs/bcachefs/fs.c:2489
[<0>] vfs_get_tree+0x92/0x2b0 fs/super.c:1804
[<0>] do_new_mount+0x24a/0xa40 fs/namespace.c:3902
[<0>] do_mount fs/namespace.c:4239 [inline]
[<0>] __do_sys_mount fs/namespace.c:4450 [inline]
[<0>] __se_sys_mount+0x317/0x410 fs/namespace.c:4427
[<0>] do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
[<0>] do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
[<0>] entry_SYSCALL_64_after_hwframe+0x77/0x7f
CPU: 0 UID: 0 PID: 5318 Comm: syz.0.0 Not tainted 6.16.0-rc3-syzkaller-00121-gf02769e7f272 #0 PREEMPT(full) 
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
 <TASK>
 dump_stack_lvl+0x99/0x250 lib/dump_stack.c:120
 panic+0x2db/0x790 kernel/panic.c:382
 bch2_trans_in_restart_error+0xdb/0x110 fs/bcachefs/btree_iter.c:1455
 bch2_trans_unlocked_or_in_restart_error+0xc2/0x110 fs/bcachefs/btree_iter.c:1468
 bch2_trans_verify_not_unlocked_or_in_restart fs/bcachefs/btree_iter.h:344 [inline]
 bch2_path_get+0x108c/0x1540 fs/bcachefs/btree_iter.c:1747
 bch2_trans_iter_init_common fs/bcachefs/btree_iter.h:529 [inline]
 bch2_trans_iter_init fs/bcachefs/btree_iter.h:543 [inline]
 __bch2_bkey_get_iter fs/bcachefs/btree_iter.h:631 [inline]
 bch2_bkey_get_iter fs/bcachefs/btree_iter.h:646 [inline]
 bch2_bi_depth_renumber_one fs/bcachefs/fsck.c:2573 [inline]
 bch2_bi_depth_renumber fs/bcachefs/fsck.c:2599 [inline]
 check_path_loop fs/bcachefs/fsck.c:2717 [inline]
 bch2_check_directory_structure+0x1376/0x1f00 fs/bcachefs/fsck.c:2733
 bch2_run_recovery_pass fs/bcachefs/recovery_passes.c:485 [inline]
 __bch2_run_recovery_passes+0x392/0x1010 fs/bcachefs/recovery_passes.c:540
 bch2_run_recovery_passes+0x184/0x210 fs/bcachefs/recovery_passes.c:611
 bch2_fs_recovery+0x25fd/0x3950 fs/bcachefs/recovery.c:989
 bch2_fs_start+0xa99/0xd90 fs/bcachefs/super.c:1203
 bch2_fs_get_tree+0xb02/0x14f0 fs/bcachefs/fs.c:2489
 vfs_get_tree+0x92/0x2b0 fs/super.c:1804
 do_new_mount+0x24a/0xa40 fs/namespace.c:3902
 do_mount fs/namespace.c:4239 [inline]
 __do_sys_mount fs/namespace.c:4450 [inline]
 __se_sys_mount+0x317/0x410 fs/namespace.c:4427
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f338f9900ca
Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 1a 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f339072ee68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 00007f339072eef0 RCX: 00007f338f9900ca
RDX: 0000200000000040 RSI: 0000200000000000 RDI: 00007f339072eeb0
RBP: 0000200000000040 R08: 00007f339072eef0 R09: 0000000000204000
R10: 0000000000204000 R11: 0000000000000246 R12: 0000200000000000
R13: 00007f339072eeb0 R14: 000000000000598c R15: 0000200000000100
 </TASK>
Kernel Offset: disabled
Rebooting in 86400 seconds..


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzkaller@...glegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

If the report is already addressed, let syzbot know by replying with:
#syz fix: exact-commit-title

If you want to overwrite report's subsystems, reply with:
#syz set subsystems: new-subsystem
(See the list of subsystem names on the web dashboard)

If the report is a duplicate of another one, reply with:
#syz dup: exact-subject-of-another-report

If you want to undo deduplication, reply with:
#syz undup

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ